Terraform Registry Module for HashiQube - a DevOps Development Lab using all the HashiCorp Products.
This repo contains a Terraform module for provisioning HashiQube on Any Cloud or All of them at once! Think of Consul Service Mesh, Vault and Nomad Clusters.
A DevOps Development lab running all HashiCorp products.
DO NOT USE HASHIQUBE IN PRODUCTION
This Module will help you launch HashiQube in any Cloud, AWS, GCP, Azure or all of them at once. You can then use any HashiCorp product to integrate with Cloud Service to assist your learning or POC Labs
Hashiqube is a DevOps Lab in a Docker Container. Hashiqube has a Docker daemon inside meaning, we can run containers inside Hashiqube using Kubernetes (Minikube) or Nomad or Docker run. It runs all Hashicorp products. Vault, Terraform, Nomad, Consul, Waypoint, Boundary, Vagrant, Packer and Sentinel.
It also runs a host of other popular Open Source DevOps/DevSecOps applications (Minikube, Ansible AWX Tower, Traefik etc.) showcasing how simple integration with Hashicorp products can result in tangible learnings and benefits for all its users.
Once Hashiqube is up an internet connection is no longer needed meaning sales pitches and demos for potential and existing customers are greatly aided.
Hashiqube has been created to help Engineers, Developers and anyone who wants to practise, learn or demo HashiCorp products to get started quickly with a local lab.
Please connect with me on LinkedIn (Riaan Nolan) or check out my Credly profile
#Hashicorp #Vault #Consul #Nomad #Waypoint #Boundary #HashiQube #Kifftech #Curious
The basic concept is, we spin up a cloud instance, we install docker
and vagrant
and we clone https://github.com/star3am/hashiqube into /home/ubuntu/hashiqube
We then use vagrant to spin up Hashiqube as a docker container with all the Hashicorp tools inside of this docker container. So Vault, Nomad, Consul, Boundary and Waypoint actually runs inside a docker container on the cloud instance.
ubuntu@hashiqube-aws:~$ vagrant status
Current machine states:
hashiqube0.service.consul running (docker)
The container is created and running. You can stop it using
`vagrant halt`, see logs with `vagrant docker-logs`, and
kill/destroy it with `vagrant destroy`.
ubuntu@hashiqube-aws:~$ docker ps
CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES
f6bc621e730e 7b224f871e2a "/usr/sbin/init" 58 minutes ago Up 58 minutes 0.0.0.0:1433->1433/tcp, :::1433->1433/tcp, 0.0.0.0:3306->3306/tcp, :::3306->3306/tcp, 0.0.0.0:3333->3333/tcp, :::3333->3333/tcp, 0.0.0.0:4566->4566/tcp, :::4566->4566/tcp, 0.0.0.0:4646-4648->4646-4648/tcp, :::4646-4648->4646-4648/tcp, 0.0.0.0:5001-5002->5001-5002/tcp, :::5001-5002->5001-5002/tcp, 0.0.0.0:5432->5432/tcp, :::5432->5432/tcp, 0.0.0.0:7777->7777/tcp, :::7777->7777/tcp, 0.0.0.0:8000->8000/tcp, :::8000->8000/tcp, 0.0.0.0:8043->8043/tcp, :::8043->8043/tcp, 0.0.0.0:8080->8080/tcp, :::8080->8080/tcp, 0.0.0.0:8088->8088/tcp, :::8088->8088/tcp, 0.0.0.0:8181->8181/tcp, :::8181->8181/tcp, 0.0.0.0:8200->8200/tcp, :::8200->8200/tcp, 0.0.0.0:8300-8302->8300-8302/tcp, :::8300-8302->8300-8302/tcp, 0.0.0.0:8500->8500/tcp, :::8500->8500/tcp, 0.0.0.0:8888-8889->8888-8889/tcp, :::8888-8889->8888-8889/tcp, 0.0.0.0:9001-9002->9001-9002/tcp, :::9001-9002->9001-9002/tcp, 0.0.0.0:9011->9011/tcp, :::9011->9011/tcp, 0.0.0.0:9022->9022/tcp, :::9022->9022/tcp, 0.0.0.0:9701-9702->9701-9702/tcp, :::9701-9702->9701-9702/tcp, 0.0.0.0:9998-9999->9998-9999/tcp, :::9998-9999->9998-9999/tcp, 0.0.0.0:10888->10888/tcp, :::10888->10888/tcp, 0.0.0.0:18080->18080/tcp, :::18080->18080/tcp, 0.0.0.0:18181->18181/tcp, :::18181->18181/tcp, 0.0.0.0:18888-18889->18888-18889/tcp, :::18888-18889->18888-18889/tcp, 0.0.0.0:19200->19200/tcp, :::19200->19200/tcp, 0.0.0.0:19701-19702->19701-19702/tcp, :::19701-19702->19701-19702/tcp, 0.0.0.0:28080->28080/tcp, :::28080->28080/tcp, 0.0.0.0:31506->31506/tcp, :::31506->31506/tcp, 0.0.0.0:8600->8600/udp, :::8600->8600/udp, 0.0.0.0:2255->22/tcp, :::2255->22/tcp, 0.0.0.0:33389->389/tcp, :::33389->389/tcp hashiqube_hashiqube0serviceconsul_1684968900
- Download and Install VSCode https://code.visualstudio.com/
- Install the VSCode Remote Containers extension https://code.visualstudio.com/docs/devcontainers/containers
- Install Docker Desktop
Everything you need is done via the Dockerfile, and once you open this project folder with VSCode Dev Containers, you will be dropped into a container built of the Dockerfile with Terraform already installed.
You simple need to configure your Cloud authentication, and this is done by exporting the following Environment variables, be sure to look at the helpful links
Authentication
- Azure: https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/guides/service_principal_client_secret#creating-a-service-principal
- AWS: https://registry.terraform.io/providers/hashicorp/aws/latest/docs#environment-variables
- GCP: https://registry.terraform.io/providers/hashicorp/google/latest/docs/guides/provider_reference.html#authentication-configuration
# https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/guides/service_principal_client_secret#creating-a-service-principal
export AWS_ACCESS_KEY_ID=YOUR_AWS_ACCESS_KEY_ID
export AWS_SECRET_ACCESS_KEY=YOUR_AWS_SECRET_ACCESS_KEY
export AWS_REGION=YOUR_AWS_REGION
# https://registry.terraform.io/providers/hashicorp/google/latest/docs/guides/provider_reference.html#authentication-configuration
export GOOGLE_CREDENTIALS='YOUR_GOOGLE_CREDENTIALS_FILE_JSON'
# https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/guides/service_principal_client_secret#creating-a-service-principal
export ARM_CLIENT_ID=YOUR_ARM_CLIENT_ID
export ARM_CLIENT_SECRET=YOUR_ARM_CLIENT_SECRET
export ARM_SUBSCRIPTION_ID=YOUR_ARM_SUBSCRIPTION_ID
export ARM_TENANT_ID=YOUR_ARM_TENANT_ID
Also see terraform.auto.tfvars.example which you should copy to terraform.auto.tfvars and fill in the details
terraform.auto.tfvars
debug_user_data = true
deploy_to_aws = true
deploy_to_gcp = false
deploy_to_azure = false
ssh_public_key = "ssh-rsa AAAAB3N....."
vagrant_provisioners = "basetools,docker,minikube,ansible-tower"
ssh_private_key = <<EOF
-----ENTER YOUR PRIVATE KEY-----
...
...
...
...
-----ENTER YOUR PRIVATE KEY-----
EOF
aws_profile = "YOUR_AWS_PROFILE"
gcp_project = "YOUR_GCP_PROJECT"
gcp_region = "australia-southeast1"
See examples folder
- Run
terraform plan
andterraform apply
- The Terraform Output will look something like:
Outputs:
aaa_welcome =
Your HashiQube instance is busy launching, usually this takes ~5 minutes.
Below are some links to open in your browser, and commands you can copy and paste in a terminal to login via SSH into your HashiQube instance.
Thank you for using this module, you are most welcome to fork this repository to make it your own.
** DO NOT USE THIS IN PRODUCTION **
aab_instructions =
Use the Hashiqube SSH output below to login to your instance
To get Vault Shamir keys and Root token do "sudo cat /etc/vault/init.file"
aws_hashiqube-boundary = "http://13.55.129.xxx:19200 username: admin password: password"
aws_hashiqube-consul = "http://13.55.129.xxx:8500"
aws_hashiqube-fabio-lb = "http://13.55.129.xxx:9999"
aws_hashiqube-fabio-ui = "http://13.55.129.xxx:9998"
aws_hashiqube-nomad = "http://13.55.129.xxx:4646"
aws_hashiqube-ssh = "ssh ubuntu@13.55.129.xxx"
aws_hashiqube-traefik-lb = "http://13.55.129.xxx:8080"
aws_hashiqube-traefik-ui = "http://13.55.129.xxx:8181"
aws_hashiqube-vault = "http://13.55.129.xxx:8200"
aws_hashiqube-waypoint = "https://13.55.129.xxx:9702"
aws_hashiqube_ip = "13.55.129.xxx"
azure_hashiqube-boundary = "http://4.196.162.xxx:19200 username: admin password: password"
azure_hashiqube-consul = "http://4.196.162.xxx:8500"
azure_hashiqube-fabio-lb = "http://4.196.162.xxx:9999"
azure_hashiqube-fabio-ui = "http://4.196.162.xxx:9998"
azure_hashiqube-nomad = "http://4.196.162.xxx:4646"
azure_hashiqube-ssh = "ssh ubuntu@4.196.162.xxx"
azure_hashiqube-traefik-lb = "http://4.196.162.xxx:8080"
azure_hashiqube-traefik-ui = "http://4.196.162.xxx:8181"
azure_hashiqube-vault = "http://4.196.162.xxx:8200"
azure_hashiqube-waypoint = "https://4.196.162.xxx:9702"
azure_hashiqube_ip = "4.196.162.xxx"
gcp_hashiqube-boundary = "http://35.244.86.xxx:19200 username: admin password: password"
gcp_hashiqube-consul = "http://35.244.86.xxx:8500"
gcp_hashiqube-fabio-lb = "http://35.244.86.xxx:9999"
gcp_hashiqube-fabio-ui = "http://35.244.86.xxx:9998"
gcp_hashiqube-nomad = "http://35.244.86.xxx:4646"
gcp_hashiqube-ssh = "ssh ubuntu@35.244.86.xxx"
gcp_hashiqube-traefik-lb = "http://35.244.86.xxx:8080"
gcp_hashiqube-traefik-ui = "http://35.244.86.xxx:8181"
gcp_hashiqube-vault = "http://35.244.86.xxx:8200"
gcp_hashiqube-waypoint = "https://35.244.86.xxx:9702"
gcp_hashiqube_ip = "35.244.86.xxx"
your_ipaddress = "101.189.211.xxx"
After your Hashiqube instances has been launched you can access them by using the SSH commands in the Terraform Apply Output, and you will see something like this
I use ~/.bash_aliases
file to make it easier to interact with Hashicorp tools running in the hashiqube docker container.
ubuntu@hashiqube-aws:~$ cat ~/.bash_aliases
alias vagrant='cd /home/ubuntu/hashiqube; vagrant'
nomad() { cd /home/ubuntu/hashiqube; vagrant ssh -c "nomad $1 $2 $3 $4 $5" ;}
consul() { cd /home/ubuntu/hashiqube; vagrant ssh -c "consul $1 $2 $3 $4 $5" ;}
vault() { cd /home/ubuntu/hashiqube; vagrant ssh -c "vault $1 $2 $3 $4 $5" ;}
waypoint() { cd /home/ubuntu/hashiqube; vagrant ssh -c "waypoint $1 $2 $3 $4 $5" ;}
boundary() { cd /home/ubuntu/hashiqube; vagrant ssh -c "boundary $1 $2 $3 $4 $5" ;}
💡 Meaning that when you issue the command vault
or nomad
or consul
it is ACTUALLY executed via vagrant ssh -c $command
this is just to make things a bit easier for you, of course, you can still use the vagrant ssh -c "vault status
like you'd normally do.
You can then interact with Hashicorp's Services running in Hashiqube, for example:
Get Vault status
ubuntu@hashiqube-aws:~/hashiqube# vault status
Key Value
--- -----
Seal Type shamir
Initialized true
Sealed false
Total Shares 5
Threshold 3
Version 1.13.2
Build Date 2023-04-25T13:02:50Z
Storage Type file
Cluster Name vault
Cluster ID 4731c701-5575-be22-6678-8ba210f7f045
HA Enabled false
Connection to 127.0.0.1 closed.
Or normally via vagrant ssh -c
like below
ubuntu@hashiqube-aws:~/hashiqube$ vagrant ssh -c "vault status"
Key Value
--- -----
Seal Type shamir
Initialized true
Sealed false
Total Shares 5
Threshold 3
Version 1.13.2
Build Date 2023-04-25T13:02:50Z
Storage Type file
Cluster Name vault
Cluster ID 114f0631-9c5b-df15-71ec-9740776d8693
HA Enabled false
Connection to 127.0.0.1 closed.
Get Nomad Job Status
ubuntu@hashiqube-aws:~/hashiqube# nomad job status
ID Type Priority Status Submit Date
fabio system 50 running 2023-05-23T22:59:55Z
nomad-trex-nodejs-01h15dkdgxxp6pw1fa7409q59z service 10 running 2023-05-23T23:02:42Z
nomad-trex-nodejs-01h15dkhnh3zzwa03jdjvsh6e5 service 10 running 2023-05-23T23:02:46Z
traefik service 50 running 2023-05-23T22:59:56Z
traefik-whoami service 50 running 2023-05-23T23:00:15Z
waypoint-server service 50 running 2023-05-23T23:00:47Z
Connection to 127.0.0.1 closed.
Get Nomad Server Members
ubuntu@hashiqube-aws:~/hashiqube# nomad server members
Name Address Port Status Leader Raft Version Build Datacenter Region
hashiqube-aws.service.consul.global 10.9.99.11 5648 alive true 3 1.5.6 aws global
hashiqube-azure.service.consul.global 10.9.99.13 5648 failed false 3 1.5.6 azure global
hashiqube-gcp.service.consul.global 10.9.99.12 5648 failed false 3 1.5.6 gcp global
Connection to 127.0.0.1 closed.
Get Consul Members
ubuntu@hashiqube-aws:~/hashiqube# consul members -wan
Node Address Status Type Build Protocol DC Partition Segment
hashiqube-aws.service.consul.aws 10.9.99.11:8302 alive server 1.15.2 3 aws default <all>
hashiqube-azure.service.consul.azure 10.9.99.13:8302 failed server 1.15.2 3 azure default <all>
hashiqube-gcp.service.consul.gcp 10.9.99.12:8302 failed server 1.15.2 3 gcp default <all>
Connection to 127.0.0.1 closed.
Or simply access the Hashiqube container to interact freely with the Hashicorp Services, edit config files and so on
ubuntu@hashiqube-aws:~/hashiqube# vagrant ssh
_ _ _ _ _ _
| |__ __ _ ___| |__ (_) __ _ _ _| |__ ___ __ ___ _____ ___ ___ _ ____ _(_) ___ ___ ___ ___ _ __ ___ _ _| |
| '_ \ / _` / __| '_ \| |/ _` | | | | '_ \ / _ \_____ / _` \ \ /\ / / __| / __|/ _ \ '__\ \ / / |/ __/ _ \ / __/ _ \| '_ \/ __| | | | |
| | | | (_| \__ \ | | | | (_| | |_| | |_) | __/_____| (_| |\ V V /\__ \_\__ \ __/ | \ V /| | (_| __/| (_| (_) | | | \__ \ |_| | |
|_| |_|\__,_|___/_| |_|_|\__, |\__,_|_.__/ \___| \__,_| \_/\_/ |___(_)___/\___|_| \_/ |_|\___\___(_)___\___/|_| |_|___/\__,_|_|
|_|
* Documentation: https://help.ubuntu.com
* Management: https://landscape.canonical.com
* Support: https://ubuntu.com/advantage
Last login: Tue May 23 23:28:49 2023 from 172.17.0.1
vagrant@hashiqube-aws:~$
Get Waypoint Token
ubuntu@hashiqube-aws:~/hashiqube# vagrant ssh -c "cat /home/vagrant/.waypoint-nomad-token"
HZCwuUtmrrpW5ycZ63TToJgrFN3CsxSYJT5pEo2kWp1npxEksykGHtZ9uAUkj5YhqL6Q4ZHAPCGToVLCpanmAoASuABmbFQvnjgRzEtt5zDbkosYD4KXFimWhKx1NC5EnQn8c71qivsms7pLXYMknmfSsmRaLjDhkJmW
And acces Waypoint on the address in the Output of Terraform Apply in your browser
aws_hashiqube-waypoint = "https://13.55.129.xxx:9702"
Access Hashicorp Boundary on Hashiqube on the address in the Output of Terraform Apply in your browser
aws_hashiqube-boundary = "http://13.55.129.152:19200 username: admin password: password"
https://code.visualstudio.com/docs/devcontainers/containers
The Visual Studio Code Dev Containers extension lets you use a container as a full-featured development environment. It allows you to open any folder inside (or mounted into) a container and take advantage of Visual Studio Code's full feature set. A devcontainer.json file in your project tells VS Code how to access (or create) a development container with a well-defined tool and runtime stack. This container can be used to run an application or to separate tools, libraries, or runtimes needed for working with a codebase.
Workspace files are mounted from the local file system or copied or cloned into the container. Extensions are installed and run inside the container, where they have full access to the tools, platform, and file system. This means that you can seamlessly switch your entire development environment just by connecting to a different container.
Also install these popular Extensions to help you get started:
-
Azure Terraform Extension https://marketplace.visualstudio.com/items?itemName=ms-azuretools.vscode-azureterraform
-
Terraform Extension https://marketplace.visualstudio.com/items?itemName=HashiCorp.terraform
-
Install Git History Extension https://marketplace.visualstudio.com/items?itemName=donjayamanne.githistory
-
Install GitLens Extension https://marketplace.visualstudio.com/items?itemName=eamodio.gitlens
-
YAML Extension https://marketplace.visualstudio.com/items?itemName=redhat.vscode-yaml
-
Docker Remote Extension (Dev Containers / Remote Containers) https://marketplace.visualstudio.com/items?itemName=ms-vscode-remote.remote-containers
-
AWS Toolkit https://aws.amazon.com/visualstudiocode/
-
AWS CloudFormation Extension https://marketplace.visualstudio.com/items?itemName=aws-scripting-guy.cform
-
Dracula Dark Theme https://marketplace.visualstudio.com/items?itemName=dracula-theme.theme-dracula
-
Live Share Extension https://marketplace.visualstudio.com/items?itemName=MS-vsliveshare.vsliveshare-pack
HashiCorp blog post: https://www.hashicorp.com/resources/hashiqube-a-development-lab-using-all-the-hashicorp-products
HashiQube website: https://hashiqube.com
HashiQube github: https://github.com/star3am/hashiqube
HashiQube youtube: https://www.youtube.com/watch?v=6jGDAGWaFiw
HashiQube medium: https://medium.com/search?q=hashiqube
HashiQube has been created to help developers and engineers to get up to speed with HashiCorp products. It can be used for development, testing or training. HashiQube gives all interested parties the empowerment to deploy these tools in a way covers multiple use cases effectively providing a 'concept to completion' testbed using open-source HashiCorp products.
A Terraform "module" refers to a self-contained package of Terraform configurations that are managed as a group. For more information around modules refer to the Terraform documentation
To use this module You have 2 options
-
You clone this repository and edit the variables.tf file or rename terraform.auto.tfvars.example to terraform.auto.tfvars and edit the values.
-
You can look for an example in the examples folder, this will use the module from the Terraform Registry
In both cases you only need to edit the variables.tf or terraform.auto.tfvars
I've tried to include the batteries, so all you need to do is enable your cloud (or all 3) in variables.tf
variable "deploy_to_aws" {
type = bool
default = true
description = "Deploy Hashiqube on AWS"
}
variable "deploy_to_gcp" {
type = bool
default = true
description = "Deploy Hashiqube on GCP"
}
variable "deploy_to_azure" {
type = bool
default = true
description = "Deploy Hashiqube on Azure"
}
You can then apply this Terraform configuration via:
terraform init -upgrade
Upgrading modules...
- aws-hashiqube in modules/aws-hashiqube
- azure-hashiqube in modules/azure-hashiqube
- gcp-hashiqube in modules/gcp-hashiqube
Initializing the backend...
Initializing provider plugins...
- Finding latest version of hashicorp/null...
- Finding latest version of hashicorp/external...
- Finding hashicorp/google versions matching "~> 4.65"...
- Finding hashicorp/aws versions matching "~> 4.67"...
- Finding hashicorp/azurerm versions matching "3.57.0"...
- Using previously-installed hashicorp/null v3.2.1
- Using previously-installed hashicorp/external v2.3.1
- Installing hashicorp/google v4.66.0...
- Installed hashicorp/google v4.66.0 (signed by HashiCorp)
- Using previously-installed hashicorp/aws v4.67.0
- Using previously-installed hashicorp/azurerm v3.57.0
Terraform has made some changes to the provider dependency selections recorded
in the .terraform.lock.hcl file. Review those changes and commit them to your
version control system if they represent changes you intended to make.
Terraform has been successfully initialized!
You may now begin working with Terraform. Try running "terraform plan" to see
any changes that are required for your infrastructure. All Terraform commands
should now work.
If you ever set or change modules or backend configuration for Terraform,
rerun this command to reinitialize your working directory. If you forget, other
commands will detect it and remind you to do so if necessary.
terraform apply
Terraform used the selected providers to generate the following execution plan. Resource actions are
indicated with the following symbols:
+ create
Terraform will perform the following actions:
# null_resource.hashiqube will be created
+ resource "null_resource" "hashiqube" {
+ id = (known after apply)
+ triggers = {
+ "deploy_to_aws" = "true"
+ "deploy_to_azure" = "true"
+ "deploy_to_gcp" = "true"
+ "my_ipaddress" = "101.189.211.xxx"
}
}
# module.aws-hashiqube[0].aws_eip.hashiqube will be created
+ resource "aws_eip" "hashiqube" {
+ allocation_id = (known after apply)
+ association_id = (known after apply)
+ carrier_ip = (known after apply)
+ customer_owned_ip = (known after apply)
+ domain = (known after apply)
+ id = (known after apply)
+ instance = (known after apply)
+ network_border_group = (known after apply)
+ network_interface = (known after apply)
+ private_dns = (known after apply)
+ private_ip = (known after apply)
+ public_dns = (known after apply)
+ public_ip = (known after apply)
+ public_ipv4_pool = (known after apply)
+ tags_all = (known after apply)
+ vpc = true
}
# module.aws-hashiqube[0].aws_eip_association.eip_assoc will be created
+ resource "aws_eip_association" "eip_assoc" {
+ allocation_id = (known after apply)
+ id = (known after apply)
+ instance_id = (known after apply)
+ network_interface_id = (known after apply)
+ private_ip_address = (known after apply)
+ public_ip = (known after apply)
}
# module.aws-hashiqube[0].aws_iam_instance_profile.hashiqube will be created
+ resource "aws_iam_instance_profile" "hashiqube" {
+ arn = (known after apply)
+ create_date = (known after apply)
+ id = (known after apply)
+ name = "hashiqube"
+ name_prefix = (known after apply)
+ path = "/"
+ role = "hashiqube"
+ tags_all = (known after apply)
+ unique_id = (known after apply)
}
# module.aws-hashiqube[0].aws_iam_role.hashiqube will be created
+ resource "aws_iam_role" "hashiqube" {
+ arn = (known after apply)
+ assume_role_policy = jsonencode(
{
+ Statement = [
+ {
+ Action = "sts:AssumeRole"
+ Effect = "Allow"
+ Principal = {
+ Service = "ec2.amazonaws.com"
}
+ Sid = ""
},
]
+ Version = "2012-10-17"
}
)
+ create_date = (known after apply)
+ force_detach_policies = false
+ id = (known after apply)
+ managed_policy_arns = (known after apply)
+ max_session_duration = 3600
+ name = "hashiqube"
+ name_prefix = (known after apply)
+ path = "/"
+ role_last_used = (known after apply)
+ tags_all = (known after apply)
+ unique_id = (known after apply)
+ inline_policy {
+ name = (known after apply)
+ policy = (known after apply)
}
}
# module.aws-hashiqube[0].aws_iam_role_policy.hashiqube will be created
+ resource "aws_iam_role_policy" "hashiqube" {
+ id = (known after apply)
+ name = "hashiqube"
+ policy = jsonencode(
{
+ Statement = [
+ {
+ Action = [
+ "ec2:Describe*",
]
+ Effect = "Allow"
+ Resource = "*"
},
]
+ Version = "2012-10-17"
}
)
+ role = (known after apply)
}
# module.aws-hashiqube[0].aws_instance.hashiqube will be created
+ resource "aws_instance" "hashiqube" {
+ ami = "ami-0d02292614a3b0df1"
+ arn = (known after apply)
+ associate_public_ip_address = (known after apply)
+ availability_zone = (known after apply)
+ cpu_core_count = (known after apply)
+ cpu_threads_per_core = (known after apply)
+ disable_api_stop = (known after apply)
+ disable_api_termination = (known after apply)
+ ebs_optimized = (known after apply)
+ get_password_data = false
+ host_id = (known after apply)
+ host_resource_group_arn = (known after apply)
+ iam_instance_profile = "hashiqube"
+ id = (known after apply)
+ instance_initiated_shutdown_behavior = (known after apply)
+ instance_state = (known after apply)
+ instance_type = "t2.medium"
+ ipv6_address_count = (known after apply)
+ ipv6_addresses = (known after apply)
+ key_name = "hashiqube"
+ monitoring = (known after apply)
+ outpost_arn = (known after apply)
+ password_data = (known after apply)
+ placement_group = (known after apply)
+ placement_partition_number = (known after apply)
+ primary_network_interface_id = (known after apply)
+ private_dns = (known after apply)
+ private_ip = (known after apply)
+ public_dns = (known after apply)
+ public_ip = (known after apply)
+ secondary_private_ips = (known after apply)
+ security_groups = [
+ "hashiqube",
]
+ source_dest_check = true
+ subnet_id = (known after apply)
+ tags = {
+ "Name" = "hashiqube"
}
+ tags_all = {
+ "Name" = "hashiqube"
}
+ tenancy = (known after apply)
+ user_data = (known after apply)
+ user_data_base64 = (known after apply)
+ user_data_replace_on_change = false
+ vpc_security_group_ids = (known after apply)
+ capacity_reservation_specification {
+ capacity_reservation_preference = (known after apply)
+ capacity_reservation_target {
+ capacity_reservation_id = (known after apply)
+ capacity_reservation_resource_group_arn = (known after apply)
}
}
+ cpu_options {
+ amd_sev_snp = (known after apply)
+ core_count = (known after apply)
+ threads_per_core = (known after apply)
}
+ ebs_block_device {
+ delete_on_termination = (known after apply)
+ device_name = (known after apply)
+ encrypted = (known after apply)
+ iops = (known after apply)
+ kms_key_id = (known after apply)
+ snapshot_id = (known after apply)
+ tags = (known after apply)
+ throughput = (known after apply)
+ volume_id = (known after apply)
+ volume_size = (known after apply)
+ volume_type = (known after apply)
}
+ enclave_options {
+ enabled = (known after apply)
}
+ ephemeral_block_device {
+ device_name = (known after apply)
+ no_device = (known after apply)
+ virtual_name = (known after apply)
}
+ maintenance_options {
+ auto_recovery = (known after apply)
}
+ metadata_options {
+ http_endpoint = (known after apply)
+ http_put_response_hop_limit = (known after apply)
+ http_tokens = (known after apply)
+ instance_metadata_tags = (known after apply)
}
+ network_interface {
+ delete_on_termination = (known after apply)
+ device_index = (known after apply)
+ network_card_index = (known after apply)
+ network_interface_id = (known after apply)
}
+ private_dns_name_options {
+ enable_resource_name_dns_a_record = (known after apply)
+ enable_resource_name_dns_aaaa_record = (known after apply)
+ hostname_type = (known after apply)
}
+ root_block_device {
+ delete_on_termination = (known after apply)
+ device_name = (known after apply)
+ encrypted = (known after apply)
+ iops = (known after apply)
+ kms_key_id = (known after apply)
+ tags = (known after apply)
+ throughput = (known after apply)
+ volume_id = (known after apply)
+ volume_size = (known after apply)
+ volume_type = (known after apply)
}
}
# module.aws-hashiqube[0].aws_key_pair.hashiqube will be created
+ resource "aws_key_pair" "hashiqube" {
+ arn = (known after apply)
+ fingerprint = (known after apply)
+ id = (known after apply)
+ key_name = "hashiqube"
+ key_name_prefix = (known after apply)
+ key_pair_id = (known after apply)
+ key_type = (known after apply)
+ public_key = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAd1E2uJrIFr8PVIMiGvCCdwpL2UHjTz3QZUL361QCsZxcChAR1/DOvKygCnGEqZ2p4aBvHrEBiyHt1POQJzhtKzG4o14zmzZ5prBHFiyhFdTeqKHtYqgKVhrYPkgALLWZFcl3rSSBZpWTli3NpkfAv98aTyCrljJohUJdJkeL3RxuX6gHN"
+ tags_all = (known after apply)
}
# module.aws-hashiqube[0].aws_security_group.hashiqube will be created
+ resource "aws_security_group" "hashiqube" {
+ arn = (known after apply)
+ description = "Managed by Terraform"
+ egress = [
+ {
+ cidr_blocks = [
+ "0.0.0.0/0",
]
+ description = ""
+ from_port = 0
+ ipv6_cidr_blocks = []
+ prefix_list_ids = []
+ protocol = "-1"
+ security_groups = []
+ self = false
+ to_port = 0
},
]
+ id = (known after apply)
+ ingress = [
+ {
+ cidr_blocks = [
+ "101.189.211.xxx/32",
]
+ description = ""
+ from_port = 0
+ ipv6_cidr_blocks = []
+ prefix_list_ids = []
+ protocol = "tcp"
+ security_groups = []
+ self = false
+ to_port = 65535
},
+ {
+ cidr_blocks = [
+ "101.189.211.xxx/32",
]
+ description = ""
+ from_port = 0
+ ipv6_cidr_blocks = []
+ prefix_list_ids = []
+ protocol = "udp"
+ security_groups = []
+ self = false
+ to_port = 65535
},
]
+ name = "hashiqube"
+ name_prefix = (known after apply)
+ owner_id = (known after apply)
+ revoke_rules_on_delete = false
+ tags_all = (known after apply)
+ vpc_id = (known after apply)
}
# module.aws-hashiqube[0].aws_security_group_rule.aws_hashiqube[0] will be created
+ resource "aws_security_group_rule" "aws_hashiqube" {
+ cidr_blocks = (known after apply)
+ from_port = 0
+ id = (known after apply)
+ protocol = "-1"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = false
+ source_security_group_id = (known after apply)
+ to_port = 65535
+ type = "ingress"
}
# module.aws-hashiqube[0].aws_security_group_rule.azure_hashiqube[0] will be created
+ resource "aws_security_group_rule" "azure_hashiqube" {
+ cidr_blocks = (known after apply)
+ from_port = 0
+ id = (known after apply)
+ protocol = "-1"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = false
+ source_security_group_id = (known after apply)
+ to_port = 65535
+ type = "ingress"
}
# module.aws-hashiqube[0].aws_security_group_rule.gcp_hashiqube[0] will be created
+ resource "aws_security_group_rule" "gcp_hashiqube" {
+ cidr_blocks = (known after apply)
+ from_port = 0
+ id = (known after apply)
+ protocol = "-1"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = false
+ source_security_group_id = (known after apply)
+ to_port = 65535
+ type = "ingress"
}
# module.aws-hashiqube[0].aws_security_group_rule.whitelist_cidr[0] will be created
+ resource "aws_security_group_rule" "whitelist_cidr" {
+ cidr_blocks = [
+ "20.191.210.xxx/32",
]
+ from_port = 0
+ id = (known after apply)
+ protocol = "-1"
+ security_group_id = (known after apply)
+ security_group_rule_id = (known after apply)
+ self = false
+ source_security_group_id = (known after apply)
+ to_port = 65535
+ type = "ingress"
}
# module.aws-hashiqube[0].null_resource.hashiqube will be created
+ resource "null_resource" "hashiqube" {
+ id = (known after apply)
+ triggers = {
+ "azure_hashiqube_ip" = (known after apply)
+ "deploy_to_aws" = "true"
+ "deploy_to_azure" = "true"
+ "deploy_to_gcp" = "true"
+ "gcp_hashiqube_ip" = (known after apply)
+ "my_ipaddress" = "101.189.211.xxx"
+ "ssh_public_key" = "~/.ssh/id_rsa.pub"
+ "vault_enabled" = "true"
+ "vault_version" = "1.4.1"
+ "whitelist_cidr" = "20.191.210.xxx/32"
}
}
# module.azure-hashiqube[0].azurerm_linux_virtual_machine.hashiqube will be created
+ resource "azurerm_linux_virtual_machine" "hashiqube" {
+ admin_username = "ubuntu"
+ allow_extension_operations = true
+ computer_name = (known after apply)
+ custom_data = (sensitive value)
+ disable_password_authentication = true
+ extensions_time_budget = "PT1H30M"
+ id = (known after apply)
+ location = "australiaeast"
+ max_bid_price = -1
+ name = "hashiqube"
+ network_interface_ids = (known after apply)
+ patch_assessment_mode = "ImageDefault"
+ patch_mode = "ImageDefault"
+ platform_fault_domain = -1
+ priority = "Regular"
+ private_ip_address = (known after apply)
+ private_ip_addresses = (known after apply)
+ provision_vm_agent = true
+ public_ip_address = (known after apply)
+ public_ip_addresses = (known after apply)
+ resource_group_name = "hashiqube"
+ size = "Standard_DS1_v2"
+ tags = {
+ "environment" = "hashiqube"
}
+ virtual_machine_id = (known after apply)
+ admin_ssh_key {
+ public_key =
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAd1E2uJrIFr8PVIMiGvCCdwpL2UDOvKygCnGEqZ2p4aBvHrEBiyHt1POQJzhtKzG4o14zmzZ5prBHFiyhFdTeqKHtYqgKVhrYPkgALLWZFcl3rSSBZpWTli3NpkfAv98aTyCrljJohUJdJkeL3RxuX6gHN
+ username = "ubuntu"
}
+ os_disk {
+ caching = "ReadWrite"
+ disk_size_gb = (known after apply)
+ name = (known after apply)
+ storage_account_type = "Standard_LRS"
+ write_accelerator_enabled = false
}
+ source_image_reference {
+ offer = "0001-com-ubuntu-server-focal"
+ publisher = "Canonical"
+ sku = "20_04-lts-gen2"
+ version = "latest"
}
+ termination_notification {
+ enabled = (known after apply)
+ timeout = (known after apply)
}
}
# module.azure-hashiqube[0].azurerm_network_interface.hashiqube will be created
+ resource "azurerm_network_interface" "hashiqube" {
+ applied_dns_servers = (known after apply)
+ dns_servers = (known after apply)
+ enable_accelerated_networking = false
+ enable_ip_forwarding = false
+ id = (known after apply)
+ internal_dns_name_label = (known after apply)
+ internal_domain_name_suffix = (known after apply)
+ location = "australiaeast"
+ mac_address = (known after apply)
+ name = "hashiqube"
+ private_ip_address = (known after apply)
+ private_ip_addresses = (known after apply)
+ resource_group_name = "hashiqube"
+ tags = {
+ "environment" = "hashiqube"
}
+ virtual_machine_id = (known after apply)
+ ip_configuration {
+ gateway_load_balancer_frontend_ip_configuration_id = (known after apply)
+ name = "hashiqube"
+ primary = (known after apply)
+ private_ip_address = (known after apply)
+ private_ip_address_allocation = "Dynamic"
+ private_ip_address_version = "IPv4"
+ public_ip_address_id = (known after apply)
+ subnet_id = (known after apply)
}
}
# module.azure-hashiqube[0].azurerm_network_security_group.aws_hashiqube_ip[0] will be created
+ resource "azurerm_network_security_group" "aws_hashiqube_ip" {
+ id = (known after apply)
+ location = "australiaeast"
+ name = "aws_hashiqube_ip"
+ resource_group_name = "hashiqube"
+ security_rule = [
+ {
+ access = "Allow"
+ description = ""
+ destination_address_prefix = ""
+ destination_address_prefixes = (known after apply)
+ destination_application_security_group_ids = []
+ destination_port_range = "*"
+ destination_port_ranges = []
+ direction = "Inbound"
+ name = "aws_hashiqube_ip"
+ priority = 1003
+ protocol = "Tcp"
+ source_address_prefix = ""
+ source_address_prefixes = (known after apply)
+ source_application_security_group_ids = []
+ source_port_range = "*"
+ source_port_ranges = []
},
]
+ tags = {
+ "environment" = "hashiqube"
}
}
# module.azure-hashiqube[0].azurerm_network_security_group.azure_hashiqube_ip[0] will be created
+ resource "azurerm_network_security_group" "azure_hashiqube_ip" {
+ id = (known after apply)
+ location = "australiaeast"
+ name = "azure_hashiqube_ip"
+ resource_group_name = "hashiqube"
+ security_rule = [
+ {
+ access = "Allow"
+ description = ""
+ destination_address_prefix = ""
+ destination_address_prefixes = (known after apply)
+ destination_application_security_group_ids = []
+ destination_port_range = "*"
+ destination_port_ranges = []
+ direction = "Inbound"
+ name = "azure_hashiqube_ip"
+ priority = 1002
+ protocol = "Tcp"
+ source_address_prefix = ""
+ source_address_prefixes = (known after apply)
+ source_application_security_group_ids = []
+ source_port_range = "*"
+ source_port_ranges = []
},
]
+ tags = {
+ "environment" = "hashiqube"
}
}
# module.azure-hashiqube[0].azurerm_network_security_group.gcp_hashiqube_ip[0] will be created
+ resource "azurerm_network_security_group" "gcp_hashiqube_ip" {
+ id = (known after apply)
+ location = "australiaeast"
+ name = "gcp_hashiqube_ip"
+ resource_group_name = "hashiqube"
+ security_rule = [
+ {
+ access = "Allow"
+ description = ""
+ destination_address_prefix = ""
+ destination_address_prefixes = (known after apply)
+ destination_application_security_group_ids = []
+ destination_port_range = "*"
+ destination_port_ranges = []
+ direction = "Inbound"
+ name = "gcp_hashiqube_ip"
+ priority = 1004
+ protocol = "Tcp"
+ source_address_prefix = ""
+ source_address_prefixes = (known after apply)
+ source_application_security_group_ids = []
+ source_port_range = "*"
+ source_port_ranges = []
},
]
+ tags = {
+ "environment" = "hashiqube"
}
}
# module.azure-hashiqube[0].azurerm_network_security_group.my_ipaddress will be created
+ resource "azurerm_network_security_group" "my_ipaddress" {
+ id = (known after apply)
+ location = "australiaeast"
+ name = "hashiqube"
+ resource_group_name = "hashiqube"
+ security_rule = [
+ {
+ access = "Allow"
+ description = ""
+ destination_address_prefix = ""
+ destination_address_prefixes = (known after apply)
+ destination_application_security_group_ids = []
+ destination_port_range = "*"
+ destination_port_ranges = []
+ direction = "Inbound"
+ name = "myipaddress"
+ priority = 1001
+ protocol = "Tcp"
+ source_address_prefix = ""
+ source_address_prefixes = [
+ "101.189.211.xxx/32",
]
+ source_application_security_group_ids = []
+ source_port_range = "*"
+ source_port_ranges = []
},
]
+ tags = {
+ "environment" = "hashiqube"
}
}
# module.azure-hashiqube[0].azurerm_network_security_group.whitelist_cidr[0] will be created
+ resource "azurerm_network_security_group" "whitelist_cidr" {
+ id = (known after apply)
+ location = "australiaeast"
+ name = "whitelist_cidr"
+ resource_group_name = "hashiqube"
+ security_rule = [
+ {
+ access = "Allow"
+ description = ""
+ destination_address_prefix = ""
+ destination_address_prefixes = (known after apply)
+ destination_application_security_group_ids = []
+ destination_port_range = "*"
+ destination_port_ranges = []
+ direction = "Inbound"
+ name = "whitelist_cidr"
+ priority = 1005
+ protocol = "Tcp"
+ source_address_prefix = ""
+ source_address_prefixes = [
+ "20.191.210.171/32",
]
+ source_application_security_group_ids = []
+ source_port_range = "*"
+ source_port_ranges = []
},
]
+ tags = {
+ "environment" = "hashiqube"
}
}
# module.azure-hashiqube[0].azurerm_public_ip.hashiqube will be created
+ resource "azurerm_public_ip" "hashiqube" {
+ allocation_method = "Static"
+ ddos_protection_mode = "VirtualNetworkInherited"
+ fqdn = (known after apply)
+ id = (known after apply)
+ idle_timeout_in_minutes = 4
+ ip_address = (known after apply)
+ ip_version = "IPv4"
+ location = "australiaeast"
+ name = "hashiqube"
+ resource_group_name = "hashiqube"
+ sku = "Basic"
+ sku_tier = "Regional"
+ tags = {
+ "environment" = "hashiqube"
}
}
# module.azure-hashiqube[0].azurerm_resource_group.hashiqube will be created
+ resource "azurerm_resource_group" "hashiqube" {
+ id = (known after apply)
+ location = "australiaeast"
+ name = "hashiqube"
+ tags = {
+ "environment" = "hashiqube"
}
}
# module.azure-hashiqube[0].azurerm_subnet.hashiqube will be created
+ resource "azurerm_subnet" "hashiqube" {
+ address_prefixes = [
+ "10.0.1.0/24",
]
+ enforce_private_link_endpoint_network_policies = (known after apply)
+ enforce_private_link_service_network_policies = (known after apply)
+ id = (known after apply)
+ name = "hashiqube"
+ private_endpoint_network_policies_enabled = (known after apply)
+ private_link_service_network_policies_enabled = (known after apply)
+ resource_group_name = "hashiqube"
+ virtual_network_name = "hashiqube"
}
# module.azure-hashiqube[0].azurerm_virtual_network.hashiqube will be created
+ resource "azurerm_virtual_network" "hashiqube" {
+ address_space = [
+ "10.0.0.0/16",
]
+ dns_servers = (known after apply)
+ guid = (known after apply)
+ id = (known after apply)
+ location = "australiaeast"
+ name = "hashiqube"
+ resource_group_name = "hashiqube"
+ subnet = (known after apply)
+ tags = {
+ "environment" = "hashiqube"
}
}
# module.azure-hashiqube[0].null_resource.hashiqube will be created
+ resource "null_resource" "hashiqube" {
+ id = (known after apply)
+ triggers = {
+ "aws_hashiqube_ip" = (known after apply)
+ "azure_instance_type" = "Standard_DS1_v2"
+ "azure_region" = "Australia East"
+ "deploy_to_aws" = "true"
+ "deploy_to_azure" = "true"
+ "deploy_to_gcp" = "true"
+ "gcp_hashiqube_ip" = (known after apply)
+ "my_ipaddress" = "101.189.211.xxx"
+ "ssh_public_key" = "~/.ssh/id_rsa.pub"
+ "vault_enabled" = "true"
+ "vault_version" = "1.4.1"
+ "whitelist_cidr" = "20.191.210.xxx/32"
}
}
# module.gcp-hashiqube[0].google_compute_address.hashiqube will be created
+ resource "google_compute_address" "hashiqube" {
+ address = (known after apply)
+ address_type = "EXTERNAL"
+ creation_timestamp = (known after apply)
+ id = (known after apply)
+ name = "hashiqube"
+ network_tier = (known after apply)
+ project = (known after apply)
+ purpose = (known after apply)
+ region = (known after apply)
+ self_link = (known after apply)
+ subnetwork = (known after apply)
+ users = (known after apply)
}
# module.gcp-hashiqube[0].google_compute_firewall.aws-hashiqube_ip[0] will be created
+ resource "google_compute_firewall" "aws-hashiqube_ip" {
+ creation_timestamp = (known after apply)
+ destination_ranges = (known after apply)
+ direction = (known after apply)
+ enable_logging = (known after apply)
+ id = (known after apply)
+ name = "aws-hashiqube-ip"
+ network = "default"
+ priority = 1000
+ project = "riaan-nolan-xxx"
+ self_link = (known after apply)
+ source_ranges = (known after apply)
+ allow {
+ ports = [
+ "0-65535",
]
+ protocol = "tcp"
}
+ allow {
+ ports = [
+ "0-65535",
]
+ protocol = "udp"
}
}
# module.gcp-hashiqube[0].google_compute_firewall.azure_hashiqube_ip[0] will be created
+ resource "google_compute_firewall" "azure_hashiqube_ip" {
+ creation_timestamp = (known after apply)
+ destination_ranges = (known after apply)
+ direction = (known after apply)
+ enable_logging = (known after apply)
+ id = (known after apply)
+ name = "azure-hashiqube-ip"
+ network = "default"
+ priority = 1000
+ project = "riaan-nolan-xxx"
+ self_link = (known after apply)
+ source_ranges = (known after apply)
+ allow {
+ ports = [
+ "0-65535",
]
+ protocol = "tcp"
}
+ allow {
+ ports = [
+ "0-65535",
]
+ protocol = "udp"
}
}
# module.gcp-hashiqube[0].google_compute_firewall.gcp_hashiqube_ip[0] will be created
+ resource "google_compute_firewall" "gcp_hashiqube_ip" {
+ creation_timestamp = (known after apply)
+ destination_ranges = (known after apply)
+ direction = (known after apply)
+ enable_logging = (known after apply)
+ id = (known after apply)
+ name = "gcp-hashiqube-ip"
+ network = "default"
+ priority = 1000
+ project = "riaan-nolan-xxx"
+ self_link = (known after apply)
+ source_ranges = (known after apply)
+ allow {
+ ports = [
+ "0-65535",
]
+ protocol = "tcp"
}
+ allow {
+ ports = [
+ "0-65535",
]
+ protocol = "udp"
}
}
# module.gcp-hashiqube[0].google_compute_firewall.my_ipaddress will be created
+ resource "google_compute_firewall" "my_ipaddress" {
+ creation_timestamp = (known after apply)
+ destination_ranges = (known after apply)
+ direction = (known after apply)
+ enable_logging = (known after apply)
+ id = (known after apply)
+ name = "hashiqube-my-ipaddress"
+ network = "default"
+ priority = 1000
+ project = "riaan-nolan-xxx"
+ self_link = (known after apply)
+ source_ranges = [
+ "101.189.211.47/32",
]
+ allow {
+ ports = [
+ "0-65535",
]
+ protocol = "tcp"
}
+ allow {
+ ports = [
+ "0-65535",
]
+ protocol = "udp"
}
}
# module.gcp-hashiqube[0].google_compute_firewall.whitelist_cidr[0] will be created
+ resource "google_compute_firewall" "whitelist_cidr" {
+ creation_timestamp = (known after apply)
+ destination_ranges = (known after apply)
+ direction = (known after apply)
+ enable_logging = (known after apply)
+ id = (known after apply)
+ name = "whitelist-cidr"
+ network = "default"
+ priority = 1000
+ project = "riaan-nolan-xxx"
+ self_link = (known after apply)
+ source_ranges = [
+ "20.191.210.171/32",
]
+ allow {
+ ports = [
+ "0-65535",
]
+ protocol = "tcp"
}
+ allow {
+ ports = [
+ "0-65535",
]
+ protocol = "udp"
}
}
# module.gcp-hashiqube[0].google_compute_instance_template.hashiqube will be created
+ resource "google_compute_instance_template" "hashiqube" {
+ can_ip_forward = false
+ description = "hashiqube"
+ id = (known after apply)
+ instance_description = "hashiqube"
+ machine_type = "n1-standard-1"
+ metadata = {
+ "ssh-keys" =
ubuntu:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAd1E2uJrIFr8PVIMiGvCCdwpL2UDOvKygCnGEqZ2p4aBvHrEBiyHt1POQJzhtKzG4o14zmzZ5prBHFiyhFdTeqKHtYqgKVhrYPkgALLWZFcl3rSSBZpWTli3NpkfAv98aTyCrljJohUJdJkeL3RxuX6gHN
}
+ metadata_fingerprint = (known after apply)
+ metadata_startup_script = (known after apply)
+ name = (known after apply)
+ name_prefix = "hashiqube"
+ project = (known after apply)
+ region = (known after apply)
+ self_link = (known after apply)
+ self_link_unique = (known after apply)
+ tags = [
+ "hashiqube",
]
+ tags_fingerprint = (known after apply)
+ confidential_instance_config {
+ enable_confidential_compute = (known after apply)
}
+ disk {
+ auto_delete = true
+ boot = true
+ device_name = (known after apply)
+ disk_size_gb = 16
+ disk_type = "pd-standard"
+ interface = (known after apply)
+ mode = (known after apply)
+ source_image = "ubuntu-os-cloud/ubuntu-2004-lts"
+ type = (known after apply)
}
+ network_interface {
+ ipv6_access_type = (known after apply)
+ name = (known after apply)
+ network = (known after apply)
+ stack_type = (known after apply)
+ subnetwork = "https://www.googleapis.com/compute/v1/projects/riaan-nolan-xxx/regions/australia-southeast1/subnetworks/default"
+ subnetwork_project = (known after apply)
+ access_config {
+ nat_ip = (known after apply)
+ network_tier = (known after apply)
+ public_ptr_domain_name = (known after apply)
}
}
+ scheduling {
+ automatic_restart = true
+ on_host_maintenance = "MIGRATE"
+ preemptible = false
+ provisioning_model = (known after apply)
}
+ service_account {
+ email = (known after apply)
+ scopes = [
+ "https://www.googleapis.com/auth/compute.readonly",
+ "https://www.googleapis.com/auth/devstorage.read_write",
+ "https://www.googleapis.com/auth/userinfo.email",
]
}
}
# module.gcp-hashiqube[0].google_compute_region_instance_group_manager.hashiqube will be created
+ resource "google_compute_region_instance_group_manager" "hashiqube" {
+ base_instance_name = "hashiqube"
+ distribution_policy_target_shape = (known after apply)
+ distribution_policy_zones = [
+ "australia-southeast1-a",
+ "australia-southeast1-b",
+ "australia-southeast1-c",
]
+ fingerprint = (known after apply)
+ id = (known after apply)
+ instance_group = (known after apply)
+ list_managed_instances_results = "PAGELESS"
+ name = "hashiqube"
+ project = (known after apply)
+ region = "australia-southeast1"
+ self_link = (known after apply)
+ status = (known after apply)
+ target_size = 1
+ wait_for_instances = false
+ wait_for_instances_status = "STABLE"
+ update_policy {
+ max_surge_fixed = 3
+ max_unavailable_fixed = 0
+ minimal_action = "REPLACE"
+ type = "PROACTIVE"
}
+ version {
+ instance_template = (known after apply)
+ name = "hashiqube"
}
}
# module.gcp-hashiqube[0].google_project_iam_member.hashiqube will be created
+ resource "google_project_iam_member" "hashiqube" {
+ etag = (known after apply)
+ id = (known after apply)
+ member = (known after apply)
+ project = "riaan-nolan-xxx"
+ role = "roles/compute.networkViewer"
}
# module.gcp-hashiqube[0].google_service_account.hashiqube will be created
+ resource "google_service_account" "hashiqube" {
+ account_id = "sa-consul-compute-prod"
+ disabled = false
+ display_name = "hashiqube"
+ email = (known after apply)
+ id = (known after apply)
+ member = (known after apply)
+ name = (known after apply)
+ project = "riaan-nolan-xxx"
+ unique_id = (known after apply)
}
# module.gcp-hashiqube[0].null_resource.hashiqube will be created
+ resource "null_resource" "hashiqube" {
+ id = (known after apply)
+ triggers = {
+ "aws_hashiqube_ip" = (known after apply)
+ "azure_hashiqube_ip" = (known after apply)
+ "deploy_to_aws" = "true"
+ "deploy_to_azure" = "true"
+ "deploy_to_gcp" = "true"
+ "gcp_credentials" = "~/.gcp/credentials.json"
+ "gcp_project" = "riaan-nolan-xxx"
+ "my_ipaddress" = "101.189.211.xxx"
+ "ssh_public_key" = "~/.ssh/id_rsa.pub"
+ "vault_enabled" = "true"
+ "vault_version" = "1.4.1"
+ "whitelist_cidr" = "20.191.210.xxx/32"
}
}
Plan: 37 to add, 0 to change, 0 to destroy.
Changes to Outputs:
+ aaa_welcome =
Your HashiQube instance is busy launching, usually this takes ~5 minutes.
Below are some links to open in your browser, and commands you can copy and paste in a terminal to login via SSH into your HashiQube instance.
Thank you for using this module, you are most welcome to fork this repository to make it your own.
** DO NOT USE THIS IN PRODUCTION **
+ aab_instructions =
Use the Hashiqube SSH output below to login to your instance
To get Vault Shamir keys and Root token do "sudo cat /etc/vault/init.file"
+ aws_hashiqube-boundary = (known after apply)
+ aws_hashiqube-consul = (known after apply)
+ aws_hashiqube-fabio-lb = (known after apply)
+ aws_hashiqube-fabio-ui = (known after apply)
+ aws_hashiqube-nomad = (known after apply)
+ aws_hashiqube-ssh = (known after apply)
+ aws_hashiqube-traefik-lb = (known after apply)
+ aws_hashiqube-traefik-ui = (known after apply)
+ aws_hashiqube-vault = (known after apply)
+ aws_hashiqube-waypoint = (known after apply)
+ aws_hashiqube_ip = (known after apply)
+ azure_hashiqube-boundary = (known after apply)
+ azure_hashiqube-consul = (known after apply)
+ azure_hashiqube-fabio-lb = (known after apply)
+ azure_hashiqube-fabio-ui = (known after apply)
+ azure_hashiqube-nomad = (known after apply)
+ azure_hashiqube-ssh = (known after apply)
+ azure_hashiqube-traefik-lb = (known after apply)
+ azure_hashiqube-traefik-ui = (known after apply)
+ azure_hashiqube-vault = (known after apply)
+ azure_hashiqube-waypoint = (known after apply)
+ azure_hashiqube_ip = (known after apply)
+ gcp_hashiqube-boundary = (known after apply)
+ gcp_hashiqube-consul = (known after apply)
+ gcp_hashiqube-fabio-lb = (known after apply)
+ gcp_hashiqube-fabio-ui = (known after apply)
+ gcp_hashiqube-nomad = (known after apply)
+ gcp_hashiqube-ssh = (known after apply)
+ gcp_hashiqube-traefik-lb = (known after apply)
+ gcp_hashiqube-traefik-ui = (known after apply)
+ gcp_hashiqube-vault = (known after apply)
+ gcp_hashiqube-waypoint = (known after apply)
+ gcp_hashiqube_ip = (known after apply)
+ your_ipaddress = "101.189.211.xxx"
null_resource.hashiqube: Creating...
null_resource.hashiqube: Creation complete after 0s [id=4786748456103842066]
module.aws-hashiqube[0].aws_key_pair.hashiqube: Creating...
module.aws-hashiqube[0].aws_iam_role.hashiqube: Creating...
module.aws-hashiqube[0].aws_eip.hashiqube: Creating...
module.aws-hashiqube[0].aws_security_group.hashiqube: Creating...
module.aws-hashiqube[0].aws_key_pair.hashiqube: Creation complete after 0s [id=hashiqube]
module.aws-hashiqube[0].aws_eip.hashiqube: Creation complete after 1s [id=eipalloc-0bc3714f1aab61ada]
module.gcp-hashiqube[0].google_service_account.hashiqube: Creating...
module.gcp-hashiqube[0].google_compute_firewall.aws-hashiqube_ip[0]: Creating...
module.gcp-hashiqube[0].google_compute_firewall.my_ipaddress: Creating...
module.gcp-hashiqube[0].google_compute_firewall.whitelist_cidr[0]: Creating...
module.gcp-hashiqube[0].google_compute_address.hashiqube: Creating...
module.aws-hashiqube[0].aws_security_group.hashiqube: Creation complete after 2s [id=sg-03ad8f607da0679ed]
module.aws-hashiqube[0].aws_security_group_rule.whitelist_cidr[0]: Creating...
module.aws-hashiqube[0].aws_security_group_rule.aws_hashiqube[0]: Creating...
module.aws-hashiqube[0].aws_iam_role.hashiqube: Creation complete after 2s [id=hashiqube]
module.aws-hashiqube[0].aws_iam_role_policy.hashiqube: Creating...
module.aws-hashiqube[0].aws_iam_instance_profile.hashiqube: Creating...
module.gcp-hashiqube[0].google_service_account.hashiqube: Creation complete after 1s [id=projects/riaan-nolan-xxx/serviceAccounts/sa-consul-compute-prod@riaan-nolan-xxx.iam.gserviceaccount.com]
module.gcp-hashiqube[0].google_project_iam_member.hashiqube: Creating...
module.aws-hashiqube[0].aws_security_group_rule.whitelist_cidr[0]: Creation complete after 1s [id=sgrule-4015781165]
module.aws-hashiqube[0].aws_security_group_rule.aws_hashiqube[0]: Creation complete after 1s [id=sgrule-956318792]
module.aws-hashiqube[0].aws_iam_role_policy.hashiqube: Creation complete after 1s [id=hashiqube:hashiqube]
module.gcp-hashiqube[0].google_compute_address.hashiqube: Creation complete after 3s [id=projects/riaan-nolan-xxx/regions/australia-southeast1/addresses/hashiqube]
module.azure-hashiqube[0].null_resource.hashiqube: Creating...
module.gcp-hashiqube[0].google_compute_firewall.gcp_hashiqube_ip[0]: Creating...
module.aws-hashiqube[0].aws_security_group_rule.gcp_hashiqube[0]: Creating...
module.azure-hashiqube[0].null_resource.hashiqube: Creation complete after 0s [id=3293639629331471405]
module.aws-hashiqube[0].aws_security_group_rule.gcp_hashiqube[0]: Creation complete after 0s [id=sgrule-150453245]
module.aws-hashiqube[0].aws_iam_instance_profile.hashiqube: Creation complete after 2s [id=hashiqube]
module.gcp-hashiqube[0].google_compute_firewall.aws-hashiqube_ip[0]: Still creating... [10s elapsed]
module.gcp-hashiqube[0].google_compute_firewall.whitelist_cidr[0]: Still creating... [10s elapsed]
module.gcp-hashiqube[0].google_compute_firewall.my_ipaddress: Still creating... [10s elapsed]
module.gcp-hashiqube[0].google_project_iam_member.hashiqube: Creation complete after 10s [id=riaan-nolan-xxx/roles/compute.networkViewer/serviceAccount:sa-consul-compute-prod@riaan-nolan-xxx.iam.gserviceaccount.com]
module.gcp-hashiqube[0].google_compute_firewall.my_ipaddress: Creation complete after 13s [id=projects/riaan-nolan-xxx/global/firewalls/hashiqube-my-ipaddress]
module.gcp-hashiqube[0].google_compute_firewall.gcp_hashiqube_ip[0]: Still creating... [10s elapsed]
module.gcp-hashiqube[0].google_compute_firewall.aws-hashiqube_ip[0]: Creation complete after 13s [id=projects/riaan-nolan-xxx/global/firewalls/aws-hashiqube-ip]
module.gcp-hashiqube[0].google_compute_firewall.whitelist_cidr[0]: Creation complete after 13s [id=projects/riaan-nolan-xxx/global/firewalls/whitelist-cidr]
module.gcp-hashiqube[0].google_compute_firewall.gcp_hashiqube_ip[0]: Creation complete after 12s [id=projects/riaan-nolan-xxx/global/firewalls/gcp-hashiqube-ip]
module.azure-hashiqube[0].azurerm_resource_group.hashiqube: Creating...
module.azure-hashiqube[0].azurerm_resource_group.hashiqube: Creation complete after 1s [id=/subscriptions/b6a8efd1-471a-49ed-9835-fa8731a5e9fa/resourceGroups/hashiqube]
module.azure-hashiqube[0].azurerm_virtual_network.hashiqube: Creating...
module.azure-hashiqube[0].azurerm_public_ip.hashiqube: Creating...
module.azure-hashiqube[0].azurerm_public_ip.hashiqube: Creation complete after 2s [id=/subscriptions/b6a8efd1-471a-49ed-9835-fa8731a5e9fa/resourceGroups/hashiqube/providers/Microsoft.Network/publicIPAddresses/hashiqube]
module.aws-hashiqube[0].null_resource.hashiqube: Creating...
module.aws-hashiqube[0].null_resource.hashiqube: Creation complete after 0s [id=3228104445494908378]
module.gcp-hashiqube[0].null_resource.hashiqube: Creating...
module.aws-hashiqube[0].aws_security_group_rule.azure_hashiqube[0]: Creating...
module.gcp-hashiqube[0].google_compute_firewall.azure_hashiqube_ip[0]: Creating...
module.gcp-hashiqube[0].google_compute_instance_template.hashiqube: Creating...
module.gcp-hashiqube[0].null_resource.hashiqube: Creation complete after 0s [id=3220462360550026564]
module.aws-hashiqube[0].aws_instance.hashiqube: Creating...
module.aws-hashiqube[0].aws_security_group_rule.azure_hashiqube[0]: Creation complete after 0s [id=sgrule-2872703526]
module.azure-hashiqube[0].azurerm_virtual_network.hashiqube: Creation complete after 4s [id=/subscriptions/b6a8efd1-471a-49ed-9835-fa8731a5e9fa/resourceGroups/hashiqube/providers/Microsoft.Network/virtualNetworks/hashiqube]
module.azure-hashiqube[0].azurerm_subnet.hashiqube: Creating...
module.azure-hashiqube[0].azurerm_subnet.hashiqube: Creation complete after 4s [id=/subscriptions/b6a8efd1-471a-49ed-9835-fa8731a5e9fa/resourceGroups/hashiqube/providers/Microsoft.Network/virtualNetworks/hashiqube/subnets/hashiqube]
module.azure-hashiqube[0].azurerm_network_interface.hashiqube: Creating...
module.azure-hashiqube[0].azurerm_network_interface.hashiqube: Creation complete after 1s [id=/subscriptions/b6a8efd1-471a-49ed-9835-fa8731a5e9fa/resourceGroups/hashiqube/providers/Microsoft.Network/networkInterfaces/hashiqube]
module.azure-hashiqube[0].azurerm_network_security_group.azure_hashiqube_ip[0]: Creating...
module.azure-hashiqube[0].azurerm_network_security_group.whitelist_cidr[0]: Creating...
module.azure-hashiqube[0].azurerm_network_security_group.aws_hashiqube_ip[0]: Creating...
module.azure-hashiqube[0].azurerm_network_security_group.gcp_hashiqube_ip[0]: Creating...
module.azure-hashiqube[0].azurerm_network_security_group.my_ipaddress: Creating...
module.azure-hashiqube[0].azurerm_linux_virtual_machine.hashiqube: Creating...
module.azure-hashiqube[0].azurerm_network_security_group.whitelist_cidr[0]: Creation complete after 2s [id=/subscriptions/b6a8efd1-471a-49ed-9835-fa8731a5e9fa/resourceGroups/hashiqube/providers/Microsoft.Network/networkSecurityGroups/whitelist_cidr]
module.azure-hashiqube[0].azurerm_network_security_group.azure_hashiqube_ip[0]: Creation complete after 2s [id=/subscriptions/b6a8efd1-471a-49ed-9835-fa8731a5e9fa/resourceGroups/hashiqube/providers/Microsoft.Network/networkSecurityGroups/azure_hashiqube_ip]
module.azure-hashiqube[0].azurerm_network_security_group.gcp_hashiqube_ip[0]: Creation complete after 2s [id=/subscriptions/b6a8efd1-471a-49ed-9835-fa8731a5e9fa/resourceGroups/hashiqube/providers/Microsoft.Network/networkSecurityGroups/gcp_hashiqube_ip]
module.azure-hashiqube[0].azurerm_network_security_group.my_ipaddress: Creation complete after 2s [id=/subscriptions/b6a8efd1-471a-49ed-9835-fa8731a5e9fa/resourceGroups/hashiqube/providers/Microsoft.Network/networkSecurityGroups/hashiqube]
module.azure-hashiqube[0].azurerm_network_security_group.aws_hashiqube_ip[0]: Creation complete after 2s [id=/subscriptions/b6a8efd1-471a-49ed-9835-fa8731a5e9fa/resourceGroups/hashiqube/providers/Microsoft.Network/networkSecurityGroups/aws_hashiqube_ip]
module.gcp-hashiqube[0].google_compute_firewall.azure_hashiqube_ip[0]: Still creating... [10s elapsed]
module.gcp-hashiqube[0].google_compute_instance_template.hashiqube: Still creating... [10s elapsed]
module.aws-hashiqube[0].aws_instance.hashiqube: Still creating... [10s elapsed]
module.gcp-hashiqube[0].google_compute_firewall.azure_hashiqube_ip[0]: Creation complete after 12s [id=projects/riaan-nolan-xxx/global/firewalls/azure-hashiqube-ip]
module.azure-hashiqube[0].azurerm_linux_virtual_machine.hashiqube: Still creating... [10s elapsed]
module.gcp-hashiqube[0].google_compute_instance_template.hashiqube: Creation complete after 17s [id=projects/riaan-nolan-xxx/global/instanceTemplates/hashiqube20230523054916003900000001]
module.gcp-hashiqube[0].google_compute_region_instance_group_manager.hashiqube: Creating...
module.aws-hashiqube[0].aws_instance.hashiqube: Still creating... [20s elapsed]
module.azure-hashiqube[0].azurerm_linux_virtual_machine.hashiqube: Creation complete after 16s [id=/subscriptions/b6a8efd1-471a-49ed-9835-fa8731a5e9fa/resourceGroups/hashiqube/providers/Microsoft.Compute/virtualMachines/hashiqube]
module.gcp-hashiqube[0].google_compute_region_instance_group_manager.hashiqube: Still creating... [10s elapsed]
module.aws-hashiqube[0].aws_instance.hashiqube: Still creating... [30s elapsed]
module.gcp-hashiqube[0].google_compute_region_instance_group_manager.hashiqube: Still creating... [20s elapsed]
module.aws-hashiqube[0].aws_instance.hashiqube: Still creating... [40s elapsed]
module.gcp-hashiqube[0].google_compute_region_instance_group_manager.hashiqube: Still creating... [30s elapsed]
module.aws-hashiqube[0].aws_instance.hashiqube: Still creating... [50s elapsed]
module.gcp-hashiqube[0].google_compute_region_instance_group_manager.hashiqube: Creation complete after 36s [id=projects/riaan-nolan-xxx/regions/australia-southeast1/instanceGroupManagers/hashiqube]
module.aws-hashiqube[0].aws_instance.hashiqube: Still creating... [1m0s elapsed]
module.aws-hashiqube[0].aws_instance.hashiqube: Still creating... [1m10s elapsed]
module.aws-hashiqube[0].aws_instance.hashiqube: Still creating... [1m20s elapsed]
module.aws-hashiqube[0].aws_instance.hashiqube: Still creating... [1m30s elapsed]
module.aws-hashiqube[0].aws_instance.hashiqube: Creation complete after 1m32s [id=i-004984aea1d6f3fff]
module.aws-hashiqube[0].aws_eip_association.eip_assoc: Creating...
module.aws-hashiqube[0].aws_eip_association.eip_assoc: Creation complete after 1s [id=eipassoc-0f10d2ec6d656baf8]
Releasing state lock. This may take a few moments...
Apply complete! Resources: 37 added, 0 changed, 0 destroyed.
Outputs:
aaa_welcome =
Your HashiQube instance is busy launching, usually this takes ~5 minutes.
Below are some links to open in your browser, and commands you can copy and paste in a terminal to login via SSH into your HashiQube instance.
Thank you for using this module, you are most welcome to fork this repository to make it your own.
** DO NOT USE THIS IN PRODUCTION **
aab_instructions =
Use the Hashiqube SSH output below to login to your instance
To get Vault Shamir keys and Root token do "sudo cat /etc/vault/init.file"
aws_hashiqube-boundary = "http://3.105.237.xxx:19200 username: admin password: password"
aws_hashiqube-consul = "http://3.105.237.xxx:8500"
aws_hashiqube-fabio-lb = "http://3.105.237.xxx:9999"
aws_hashiqube-fabio-ui = "http://3.105.237.xxx:9998"
aws_hashiqube-nomad = "http://3.105.237.xxx:4646"
aws_hashiqube-ssh = "ssh ubuntu@3.105.237.xxx"
aws_hashiqube-traefik-lb = "http://3.105.237.xxx:8080"
aws_hashiqube-traefik-ui = "http://3.105.237.xxx:8181"
aws_hashiqube-vault = "http://3.105.237.xxx:8200"
aws_hashiqube-waypoint = "https://3.105.237.xxx:9702"
aws_hashiqube_ip = "3.105.237.xxx"
azure_hashiqube-boundary = "http://20.53.246.xxx:19200 username: admin password: password"
azure_hashiqube-consul = "http://20.53.246.xxx:8500"
azure_hashiqube-fabio-lb = "http://20.53.246.xxx:9999"
azure_hashiqube-fabio-ui = "http://20.53.246.xxx:9998"
azure_hashiqube-nomad = "http://20.53.246.xxx:4646"
azure_hashiqube-ssh = "ssh ubuntu@20.53.246.xxx"
azure_hashiqube-traefik-lb = "http://20.53.246.xxx:8080"
azure_hashiqube-traefik-ui = "http://20.53.246.xxx:8181"
azure_hashiqube-vault = "http://20.53.246.xxx:8200"
azure_hashiqube-waypoint = "https://20.53.246.xxx:9702"
azure_hashiqube_ip = "20.53.246.xxx"
gcp_hashiqube-boundary = "http://34.87.247.xxx:19200 username: admin password: password"
gcp_hashiqube-consul = "http://34.87.247.xxx:8500"
gcp_hashiqube-fabio-lb = "http://34.87.247.xxx:9999"
gcp_hashiqube-fabio-ui = "http://34.87.247.xxx:9998"
gcp_hashiqube-nomad = "http://34.87.247.xxx:4646"
gcp_hashiqube-ssh = "ssh ubuntu@34.87.247.xxx"
gcp_hashiqube-traefik-lb = "http://34.87.247.xxx:8080"
gcp_hashiqube-traefik-ui = "http://34.87.247.xxx:8181"
gcp_hashiqube-vault = "http://34.87.247.xxx:8200"
gcp_hashiqube-waypoint = "https://34.87.247.xxx:9702"
gcp_hashiqube_ip = "34.87.247.xxx"
your_ipaddress = "101.189.211.xxx"
Your IP will be whitelisted and you will be able to access the cloud instance with the commands in the Terraform Output, for example:
gcp_hashiqube-ssh = "ssh ubuntu@34.87.247.xxx" so simply do ssh ubuntu@34.87.247.xxx
azure_hashiqube-ssh = "ssh ubuntu@20.53.246.xxx" so simply do ssh ubuntu@20.53.246.xxx
aws_hashiqube-ssh = "ssh ubuntu@3.105.237.xxx" so simply do ssh ubuntu@3.105.237.xxx
Your SSH Public key in ~/.ssh/id_rsa.pub will be added to the instances, and you can configure the location of this file via the variables.tf
file
To make use of this module, you need a Cloud account. AWS, GCP and Azure is supported.
- You need a Public/Private SSH key pair.
- A Cloud account
Instructions on how to setup a SSH Key pair:
SSH Create a Public/Private Key Pair
Instructions on how to setup Cloud Account:
Google Cloud Installation and Setup
AWS Cloud Installation and Setup
When you do Terraform Apply, this is the output you will see.
Now that HashiQube is up, let's SSH into the instance.
You can check the Vault, Consul and Nomad Cluster status.
We can access Hashicorp Consul
We can also access Hashicorp Nomad
We can now enter Vault's Initial Root Token to login
We can also access Fabio Load Balancer, running as a Nomad job
Name | Type | Default | Description |
---|---|---|---|
deploy_to_aws | bool | false | Deploy Hashiqube on AWS |
deploy_to_gcp | bool | false | Deploy Hashiqube on GCP |
deploy_to_azure | bool | false | Deploy Hashiqube on Azure |
whitelist_cidr | string | "" | Additional CIDR to whitelist |
ssh_public_key | string | "~/.ssh/id_rsa.pub" | SSH public key |
azure_region | string | "Australia East" | The region in which all Azure resources will be launched |
azure_instance_type | string | "Standard_F2" | Azure instance type |
aws_credentials | string | "~/.aws/credentials" | AWS credentials file location |
aws_profile | string | "default" | AWS profile |
aws_region | string | "ap-southeast-2" | The region in which all AWS resources will be launched |
aws_instance_type | string | "t2.medium" | AWS instance type |
gcp_credentials | string | "~/.gcp/credentials.json" | GCP Credentials file |
gcp_project | string | "riaan-nolan-xxx" | GCP project ID |
gcp_region | string | "australia-southeast1" | The region in which all GCP resources will be launched |
gcp_account_id | string | "sa-consul-compute-prod" | GCP Account ID |
gcp_cluster_name | string | "hashiqube" | GCP Cluster name |
gcp_cluster_description | string | "hashiqube" | The description for the cluster |
gcp_cluster_tag_name | string | "hashiqube" | GCP Cluster tag to apply |
gcp_cluster_size | number | 1 | GCP size of the cluster |
gcp_zones | list(string) | ["australia-southeast1-a","australia-southeast1-b","australia-southeast1-c"] | The zones accross which GCP resources will be launched |
gcp_machine_type | string | "n1-standard-1" | GCP machine type |
gcp_custom_metadata | map(string) | {} | A map of metadata key value pairs to assign to the Compute Instance metadata |
gcp_root_volume_disk_size_gb | number | 16 | The size, in GB, of the root disk volume on each HashiQube node |
gcp_root_volume_disk_type | string | "pd-standard" | The GCE disk type. Can be either pd-ssd, local-ssd, or pd-standard |
Name | Description |
---|---|
ip_address | The IP address of HashiQube instance |
aws_hashiqube-consul | http://aws_hashiqube-consul:8500 |
aws_hashiqube-fabio-lb | http://aws_hashiqube-fabio-lb:9999 |
aws_hashiqube-fabio-ui | http://aws_hashiqube-fabio-ui:9998 |
aws_hashiqube-nomad | http://aws_hashiqube-nomad:4646 |
aws_hashiqube-ssh | ssh ubuntu@54.206.165.xxx |
aws_hashiqube-vault | http://aws_hashiqube-vault:8200 |
aws_hashiqube_ip | 54.206.165.xxx |
azure_hashiqube-consul | http://azure_hashiqube-consul:8500 |
azure_hashiqube-fabio-lb | http://azure_hashiqube-fabio-lb:9999 |
azure_hashiqube-fabio-ui | http://azure_hashiqube-fabio-ui:9998 |
azure_hashiqube-nomad | http://azure_hashiqube-nomad:4646 |
azure_hashiqube-ssh | ssh ubuntu@13.75.237.xxx |
azure_hashiqube-vault | http://azure_hashiqube-vault:8200 |
azure_hashiqube_ip | 13.75.237.xxx |
gcp_hashiqube-consul | http://gcp_hashiqube-consul:8500 |
gcp_hashiqube-fabio-lb | http://gcp_hashiqube-fabio-lb:9999 |
gcp_hashiqube-fabio-ui | http://gcp_hashiqube-fabio-ui:9998 |
gcp_hashiqube-nomad | http://gcp_hashiqube-nomad:4646 |
gcp_hashiqube-ssh | ssh ubuntu@34.87.219.xxx |
gcp_hashiqube-vault | http://gcp_hashiqube-vault:8200 |
gcp_hashiqube_ip | 34.87.219.xxx |
your_ipaddress | 103.234.250.xxx |
My name is Riaan Nolan and I was born in South Africa. I started out as a Web Developer in 2000 and from there progressed into Systems Administration, with a strong focus on Automation, Infrastrtucture and Configuration as Code.
I have worked for Multi-National companies in Portugal, Germany, China, South Africa, United States and Australia.
You are welcome to connect with me on Linkedin https://www.linkedin.com/in/riaannolan/
Credly profile: https://www.credly.com/users/riaan-nolan.e657145c